Call For Papers

WPMC 2016, 14 - 16 November, 2016

Prospective authors are invited to submit high-quality original technical papers reporting original research of theoretical or applied nature for presentation at the conference and publication in the WPMC 2016 Proceedings.

 

All papers for the WPMC 2016 Main Track should be submitted via EDAS using https://edas.info/newPaper.php?c=22389. Please also make sure to follow the Submission Guidelines.

 

Download Call-for-Papers for WPMC 2016.

Important Dates

  • Symposium Papers
  • July 23, 2016 (Passed)
  •  
  • Workshop Papers and Tutorial Proposals (Extended)
  • August 7, 2016 (Passed)
  •  
  • Acceptance Notification
  • September 10, 2016
  •  
  • Camera-ready Papers
  • October 21, 2016 (Hard Deadline)

 

Main Topics of interest include, but are not limited to:

Wireless Communications and PHY

  • Advanced modulation schemes
  • Cognitive radio
  • Cooperative communications
  • Information and coding theory
  • Interference characterization
  • MIMO/Massive MIMO channel models and channels
  • Smart/ Reconfigurable antennas
  • Ultra wideband, mmWave and sub-THz communications
  • Visible Light Communications

Wireless Networks

  • Ad-hoc networks
  • Cognitive radio networks
  • Cross-layer design
  • Interference management
  • IoT and M2M communications devices
  • Localization for wireless networks
  • Mobility, location and handoff management
  • Multimedia QoS and traffic management
  • Spectrum sharing and coexistence
  • Vehicular networks
  • Wireless multicast and streaming

Communications Services and Multimedia Applications

  • Big data and data mining
  • Cloud computing
  • Emerging wireless and mobile applications
  • Experimental trials and deployment
  • Mobile multimedia services
  • Mobile social networks
  • QoS and QoE for multimedia applications
  • Service oriented architectures
  • User interfaces, user-machine interactions
  • Wireless health applications

Security and Privacy in Communications

  • PHY-layer Security
  • Communication privacy and anonymity
  • Network intrusion detection and prevention, firewalls, packet filters
  • Malware, botnets and distributed denial of service
  • Public key infrastructures, key management, credential management
  • Secure routing, naming/addressing, network management
  • Security and privacy in pervasive and ubiquitous computing, e.g., RFIDs
  • Security and privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
  • Security and privacy in networks
  • Security and privacy in applications